Setting up a Myspace

Total Page:16

File Type:pdf, Size:1020Kb

Setting up a Myspace MySpace Primer: A Concise Guide On How to Use MySpace.com Safely and Responsibly 29 April 2006 Kevin Farnham Dale Farnham www.MySpaceSafetyTips.com www.HowToPrimers.com www.MySpaceSafetyTips.com MySpace Primer: A Concise Guide on How to Use MySpace.com Safely and Responsibly Copyright © 2006 Kevin and Dale Farnham This document is licensed under a Creative Commons Attribution Non-Commercial No Derivatives License Version 2.5. Permission is granted to reproduce and redistribute this document in its entirety provided that you attribute the work to the authors and publisher. Permission is granted to quote segments of this document provided that the authors are credited and the source document is named. This document may not be used for commercial purposes. All other use of this document requires written permission from the authors. Published by How-To Primers http://www.HowToPrimers.com Source document hosted at: http://www.MySpaceSafetyTips.com http://www.HowToPrimers.com 2 MySpace Primer ± 29 April 2006 About this Document This document's original source is material from the How-To Primers book MySpace Safety: 51 Tips for Teens and Parents, which will be available at www.Amazon.com and www.HowToPrimers.com in late May 2006. This document is updated more frequently than the book, so while the primer is derived from the book, it is also a supplement to the book. Disclaimer The statements in this document are based on study of MySpace.com as it existed prior to the publication date. MySpace.com is an active business. The site can change in significant ways, without advance warning to the user community. This document does not claim to represent official MySpace.com policy. Any misrepresentation of MySpace.com in this document is unintentional. While every precaution has been taken in the preparation of this document, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained in it. 3 www.MySpaceSafetyTips.com Contents 1. Introduction 2. Joining MySpace 3. Responsible Account Privacy Settings 4. What Your Profile Shouldn't Say About You 5. Photos 6. Friends & Comments 7. Blogging 8. Groups, Forums, Chat 9. Quitting MySpace Resources 4 MySpace Primer ± 29 April 2006 1. Introduction MySpace is one of a class of web sites that are termed ªsocial networkingº sites. People are given a web address where they can post information about themselves, and they can very conveniently contact other people on the same social networking site. Similar sites include Xanga.com, Friendster.com, and Facebook.com. MySpace.com is owned by Rupert Murdoch's News Corp, which purchased the site for $580 million from Intermix Media July 2005. Since the News Corp buy-out, much has improved at MySpace. Enhanced technology resources are more effectively meeting the site's ever-growing bandwidth requirements. Additional scrutiny is being applied, and the accounts of members who post pornography or hate content are being deleted. There is a new commitment to addressing safety-related issues. And, enhanced customer service resources are making it much easier for people to contact MySpace for problems that require human intervention (such as deleting accounts of underage users and addressing identity theft). 5 www.MySpaceSafetyTips.com But Isn't MySpace Dangerous? Read the headlines, and it can sound like MySpace is the most dangerous place anyone can visit on the Internet. It's not. Take any group of millions and millions of people, who are freely able to join and navigate a web site, and you are certainly going to have a large number of people who are a danger to other people, just as when you walk down any street, there are some people you walk past who have been or will be a danger to other people. The Internet is a very different ªplaceº from the ªrealº world. Yet, in many ways, the Internet is quite similar to the natural world. People interact in both worlds. People misrepresent who they are in both worlds. So, is MySpace dangerous? Every open Internet site is somewhat dangerous, so yes. Can a MySpace user take steps to significantly reduce the risk involved in using the site, without losing the benefits the site offers? Yes, absolutely. Dear Parents: MySpace Is the Future When parents first discover MySpace, the initial reaction can be shock, followed by a response of 6 MySpace Primer ± 29 April 2006 ªUnder no circumstances will I allow my teen to go to this site!º Unfortunately, this type of response may cause more problems than it solves, except in the case where the child is underage (13 and younger, in the case of MySpace.com). In most cases, banning MySpace isn't a good answer because the use of ªsocial networkingº Web sites like MySpace is considered a normal part of everyday life by a majority of teens today. Banning what a teen considers part of normal life won't help. If something's ªnormalº then young people will seek it out±when you're not at home or not monitoring the computer, or by using the computer at the home of a friend who is allowed to use MySpace, or at a computer at school or in the library. With MySpace.com challenging Google for ranking as the top page view site on the Internet, we should assume that MySpace and similar sites are going to be part of the teen and young adult world for a long time into the future. Social networking, whatever opinion one may have on whether it's good or bad, must be viewed as ªprogress.º The clock isn't going to be turned back. Social networking is here to stay. So, what's an appropriate response for parents? To get accustomed to the new world±to join MySpace, find out what it's about, learn about and teach your teens about the risks, and ideally to enjoy participating with them in this new form 7 www.MySpaceSafetyTips.com of interaction that has become normal for this younger generation. If you choose not to share these experiences with your children, then you may find yourself losing contact with them as they grow up and leave home as young adults. At minimum, you'll be losing one form of sharing with them into the future. Teens: What's Your Motive? Before you join MySpace, it's a good idea to know why you are joining it. If the reason is friends or networking, this guide can assist in making sure your MySpace experience is safe and secure. The ªBasic Infoº tab of the MySpace ªEdit Profileº screen has an entry where you respond to the prompt ªI'd Like to Make Space for.º The choices are: • Dating • Serious Relationship • Friends • Networking You can select any or all or none of these. Whatever you select is displayed in on your profile page and in search results. Someone using the 8 MySpace Primer ± 29 April 2006 MySpace browse or search functions can also use these ªmotiveº choices as search criteria. That is, they can search only for people who have identified ªDatingº as one of their reasons for joining MySpace. We highly recommend against teens using MySpace for dating or seeking a ªserious relationship.º It's too easy for people to role-play, and pretend they're 18 when they are really 43. This is what happened in several of the most publicized incidents where contact on MySpace led to meetings that turned very bad. If your goal is an in-person meeting with someone for dating / serious relationship purposes, then you are seeking to use MySpace for a different reason from what this guide assumes. In that case, you should visit the online safety sites listed in the Resources section at the end of this document, and make your decisions based on the advice they provide. Our advice is that you do not use MySpace.com (or any other online networking site) for dating or a serious relationship if you are under 18 years old. Meanwhile, if your reason for joining MySpace is to ªmake space forº friends and/or networking, and you'd like to enjoy a safe and secure MySpace experience and learn how to use MySpace responsibly, please read on! 9 www.MySpaceSafetyTips.com Five Levels of Safety 1. Every teen remembers being told ªDon't talk to strangersº and ªNever get into a car with a strangerº when they were young. If these rules are applied on MySpace, the possibility of something bad happening is minimal. 2. The risk can is much further reduced if you do not post provocative content (pictures, comments, blog entries). If you post such content, you're sending a message to people you don't know, who may interpret it in ways you don't expect. 3. A third level of safety comes from not posting information in your profile or elsewhere that identifies where you live, where you go to school, where you go for fun, what your daily schedule is, what upcoming events you plan to attend, etc. Internet safety experts have recommended against posting this kind of information on public sites for a very long time. 4. MySpace provides its own software- embedded safety through account settings, blog settings, picture settings, etc. These settings can be applied to limit who can view your information and posts. 5. Finally, there's your brain. Use it when you're online! Consciously think about the possible impact of what you're typing into the computer 10 MySpace Primer ± 29 April 2006 and onto the net.
Recommended publications
  • Creating & Connecting: Research and Guidelines on Online Social
    CREATING & CONNECTING//Research and Guidelines on Online Social — and Educational — Networking NATIONAL SCHOOL BOARDS ASSOCIATION CONTENTS Creating & Connecting//The Positives . Page 1 Online social networking Creating & Connecting//The Gaps . Page 4 is now so deeply embedded in the lifestyles of tweens and teens that Creating & Connecting//Expectations it rivals television for their atten- and Interests . Page 7 tion, according to a new study Striking a Balance//Guidance and Recommendations from Grunwald Associates LLC for School Board Members . Page 8 conducted in cooperation with the National School Boards Association. Nine- to 17-year-olds report spending almost as much time About the Study using social networking services This study was made possible with generous support and Web sites as they spend from Microsoft, News Corporation and Verizon. watching television. Among teens, The study was comprised of three surveys: an that amounts to about 9 hours a online survey of 1,277 nine- to 17-year-old students, an online survey of 1,039 parents and telephone inter- week on social networking activi- views with 250 school district leaders who make deci- ties, compared to about 10 hours sions on Internet policy. Grunwald Associates LLC, an a week watching TV. independent research and consulting firm that has conducted highly respected surveys on educator and Students are hardly passive family technology use since 1995, formulated and couch potatoes online. Beyond directed the study. Hypothesis Group managed the basic communications, many stu- field research. Tom de Boor and Li Kramer Halpern of dents engage in highly creative Grunwald Associates LLC provided guidance through- out the study and led the analysis.
    [Show full text]
  • Social Networks for Main Street
    Ulster County Main Streets: A Regional Approach Ulster County Planning Department, 244 Fair Street, Kingston NY 12401 Why do we take a regional approach to Main Streets? There are many different approaches to supporting these centers in our local economy. The goal of the Ulster County Main Streets approach is to develop a program that is based on our region‘s specific needs and support appropriate responses and strategies that are built and sustained from within our communities. It is also founded upon the idea that communities are stronger when they work together, share knowledge, leverage their resources, and think regionally to support their ―competitive advantage.‖ What is the Main Streets Strategic Toolbox? Any successful planning effort requires solid information as a basis for decision-making. The Toolbox includes resources to help your community create a strong, sustainable strategy for Main Street revitalization. For a full list of topics in the toolbox, please contact our staff at 845-340-3338 or visit our website at www.ulstercountyny.gov/planning. Social Networks for Main Street The web has become more than a warehouse of information. Social networking (or ―Web 2.0‖) is an interactive information-sharing platform that allows internet users add content and interact with others. Businesses are using Web 2.0 to increase customer loyalty and market visibility. This offers tremendous potential for Main Street businesses. Consumers are online. For them, this is ―word of mouth‖ via the web. Some examples: Main Street Webpage: “Come see and shop New Paltz Main Street.” Consumer on Facebook: “Have you been to New Paltz?” Response: “Yeah, great!”“ Twitter Tweet: Just got back from New Paltz.
    [Show full text]
  • Twitter, Myspace and Facebook Demystified - by Ted Janusz
    Twitter, MySpace and Facebook Demystified - by Ted Janusz Q: I hear people talking about Web sites like Twitter, MySpace and Facebook. What are they? And, even more importantly, should I be using them to promote oral implantology? First, you are not alone. A recent survey showed that 70 percent of American adults did not know enough about Twitter to even have an opinion. Tools like Twitter, Facebook and MySpace are components of something else you may have heard people talking about: Web 2.0 , a popular term for Internet applications in which the users are actively engaged in creating and distributing Web content. Web 1.0 probably consisted of the Web sites you saw back in the late 90s, which were nothing more than fancy electronic brochures. Web 1.5 would have been something like Amazon or eBay, sites on which one could buy, sell and leave reviews. What Web 3.0 will look like is anybody's guess! Let's look specifically at the three applications that you mentioned. Tweet, Tweet Twitter - "Twitter is like text messaging, only you can also do it from the Web," says Dan Tynan, the author of the Tynan on Technology blog. "Instead of sending a message to just one person, you can send it to thousands of people at once. You can choose to follow anyone's update (called "tweets") simply by clicking the Follow button on their profile, or vice-versa. The only rule is that each tweet can be no longer than 140 characters." Former CEO of Twitter Jack Dorsey once accepted an award for Twitter by saying, "We'd like to thank you in 140 characters or less.
    [Show full text]
  • Analysis of Topological Characteristics of Huge Online Social Networking Services Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Young-Ho Eom, Sue Moon, Hawoong Jeong
    1 Analysis of Topological Characteristics of Huge Online Social Networking Services Yong-Yeol Ahn, Seungyeop Han, Haewoon Kwak, Young-Ho Eom, Sue Moon, Hawoong Jeong Abstract— Social networking services are a fast-growing busi- the statistics severely and it is imperative to use large data sets ness in the Internet. However, it is unknown if online relationships in network structure analysis. and their growth patterns are the same as in real-life social It is only very recently that we have seen research results networks. In this paper, we compare the structures of three online social networking services: Cyworld, MySpace, and orkut, from large networks. Novel network structures from human each with more than 10 million users, respectively. We have societies and communication systems have been unveiled; just access to complete data of Cyworld’s ilchon (friend) relationships to name a few are the Internet and WWW [3] and the patents, and analyze its degree distribution, clustering property, degree Autonomous Systems (AS), and affiliation networks [4]. Even correlation, and evolution over time. We also use Cyworld data in the short history of the Internet, SNSs are a fairly new to evaluate the validity of snowball sampling method, which we use to crawl and obtain partial network topologies of MySpace phenomenon and their network structures are not yet studied and orkut. Cyworld, the oldest of the three, demonstrates a carefully. The social networks of SNSs are believed to reflect changing scaling behavior over time in degree distribution. The the real-life social relationships of people more accurately than latest Cyworld data’s degree distribution exhibits a multi-scaling any other online networks.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Social Networking: Myspace and Facebook
    [Not for Circulation] Social Networking: MySpace and Facebook Signing Up for MySpace 1. Go to http://www.MySpace.com. 2. Click on the SIGN UP! Button located in the Member Login area. 3. On the page that follows, fill in the required information to create a MySpace membership. Note: On this page you will also find options for creating a Band/Musician, Comedian, or Filmmaker MySpace page. Each choice will require different information to be filled in. 4. Once all of the information on the sign up form is completed, click the Sign Up button at the bottom of the page. 5. The next page that appears will allow you to upload a photo, so that other MySpace members can see who you are. Click the Browse button to navigate to an image on your computer that you would like to upload. If you do not have a photo at this time, you can skip this and upload a photo later. 6. Once you have chosen a photo, click the Upload button. 7. At this time you can invite friends to your new MySpace page if you have their email addresses. In the To: field located in the Invite Friends section, you can enter email addresses for up to 10 friends you would like to invite. Other friends may be added later. 8. Once you have entered email addresses, click the Send Invitation button. This will send an email to your friends inviting them to your MySpace page. 9. You have successfully signed up for MySpace! Information Technology Services, UIS 1 [Not for Circulation] Signing Up for Facebook 1.
    [Show full text]
  • Myspace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites
    CYBERPSYCHOLOGY & BEHAVIOR Volume 11, Number 2, 2008 © Mary Ann Liebert, Inc. DOI: 10.1089/cpb.2007.0056 MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites JOHN RAACKE, Ph.D. and JENNIFER BONDS-RAACKE, Ph.D. ABSTRACT The increased use of the Internet as a new tool in communication has changed the way peo- ple interact. This fact is even more evident in the recent development and use of friend-net- working sites. However, no research has evaluated these sites and their impact on college stu- dents. Therefore, the present study was conducted to evaluate: (a) why people use these friend-networking sites, (b) what the characteristics are of the typical college user, and (c) what uses and gratifications are met by using these sites. Results indicated that the vast ma- jority of college students are using these friend-networking sites for a significant portion of their day for reasons such as making new friends and locating old friends. Additionally, both men and women of traditional college age are equally engaging in this form of online com- munication with this result holding true for nearly all ethnic groups. Finally, results showed that many uses and gratifications are met by users (e.g., “keeping in touch with friends”). Re- sults are discussed in light of the impact that friend-networking sites have on communica- tion and social needs of college students. INTRODUCTION women are more likely to engage in online com- munication to maintain personal connections with LTHOUGH THE INTERNET originated in the United family, friends, and coworkers, whereas men use AStates, its use has spread quickly throughout online communication for pursuing sexual interests the world.
    [Show full text]
  • 11 Sites and Apps Kids Are Heading to After Facebook Remember
    11 Sites and Apps Kids Are Heading to After Facebook Remember MySpace? Not so long ago, practically every teen in the world was on it –- and then many left for Facebook. Now, as Facebook's popularity among teens is starting to wane, you might be wondering what the new "it" social network is. But the days of a one-stop shop for all social networking needs are over. Instead, teens are dividing their attention between an array of apps. You don't need to know the ins and outs of every app and site that's "hot" right now (and frankly, if you did, they wouldn't be trendy anymore). But knowing the basics -- what they are, why they're popular, and the problems that can crop up when they're not used responsibly. 11 Social Media Tools Parents Need to Know About Now Twitter Instagram Snapchat Tumblr Google+ Vine Wanelo Kik Messenger Ooovoo Pheed Ask.fm 1. Twitter is a microblogging site that allows users to post brief, 140-character messages -- called "tweets" -- and follow other users' activities. Why it's popular Teens like using it to share quick tidbits about their lives with friends. What parents need to know Public tweets are the norm for teens. Though you can choose to keep your tweets private, most teens report having public accounts. Updates appear immediately. Even though you can remove tweets, your followers can still read what you wrote until it's gone. This can get kids in trouble if they say something in the heat of the moment.
    [Show full text]
  • Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
    Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships.
    [Show full text]
  • Chazen Society Fellow Interest Paper Orkut V. Facebook: the Battle for Brazil
    Chazen Society Fellow Interest Paper Orkut v. Facebook: The Battle for Brazil LAUREN FRASCA MBA ’10 When it comes to stereotypes about Brazilians – that they are a fun-loving people who love to dance samba, wear tiny bathing suits, and raise their pro soccer players to the levels of demi-gods – only one, the idea that they hold human connection in high esteem, seems to be born out by concrete data. Brazilians are among the savviest social networkers in the world, by almost all engagement measures. Nearly 80 percent of Internet users in Brazil (a group itself expected to grow by almost 50 percent over the next three years1) are engaged in social networking – a global high. And these users are highly active, logging an average of 6.3 hours on social networks and 1,220 page views per month per Internet user – a rate second only to Russia, and almost double the worldwide average of 3.7 hours.2 It is precisely this broad, highly engaged audience that makes Brazil the hotly contested ground it is today, with the dominant social networking Web site, Google’s Orkut, facing stiff competition from Facebook, the leading aggregate Web site worldwide. Social Network Services Though social networking Web sites would appear to be tools born of the 21st century, they have existed since even the earliest days of Internet-enabled home computing. Starting with bulletin board services in the early 1980s (accessed over a phone line with a modem), users and creators of these Web sites grew increasingly sophisticated, launching communities such as The WELL (1985), Geocities (1994), and Tripod (1995).
    [Show full text]
  • A Longitudinal Study of Facebook, Linkedin, & Twitter
    Session: Tweet, Tweet, Tweet! CHI 2012, May 5–10, 2012, Austin, Texas, USA A Longitudinal Study of Facebook, LinkedIn, & Twitter Use Anne Archambault Jonathan Grudin Microsoft Corporation Microsoft Research Redmond, Washington USA Redmond, Washington USA [email protected] [email protected] ABSTRACT messaging, and employee blogging were first used mainly We conducted four annual comprehensive surveys of social by students and consumers to support informal interaction. networking at Microsoft between 2008 and 2011. We are Managers, who focus more on formal communication interested in how these sites are used and whether they are channels, often viewed them as potential distractions [4]. A considered to be useful for organizational communication new communication channel initially disrupts existing and information-gathering. Our study is longitudinal and channels and creates management challenges until usage based on random sampling. Between 2008 and 2011, social conventions and a new collaboration ecosystem emerges. networking went from being a niche activity to being very widely and heavily used. Growth in use and acceptance was Email was not embraced by many large organizations until not uniform, with differences based on gender, age and the late 1990s. Instant messaging was not generally level (individual contributor vs. manager). Behaviors and considered a productivity tool in the early 2000s. Slowly, concerns changed, with some showing signs of leveling off. employees familiar with these technologies found ways to use them to work more effectively. Organizational Author Keywords acceptance was aided by new features that managers Social networking; Facebook; LinkedIn; Twitter; Enterprise appreciated, such as email attachments and integration with calendaring. ACM Classification Keywords Many organizations are now wrestling with social H.5.3 Group and Organization Interfaces networking.
    [Show full text]
  • Exploring Social Media Scenarios for the Television
    Exploring Social Media Scenarios for the Television Noor F. Ali-Hasan Microsoft 1065 La Avenida Street Mountain View, CA 94043 [email protected] Abstract social media currently fits in participants‟ lives, gauge their The use of social technologies is becoming ubiquitous in the interest in potential social TV features, and understand lives of average computer users. However, social media has their concerns for such features. This paper discusses yet to infiltrate users‟ television experiences. This paper related research in combining TV and social technologies, presents the findings of an exploratory study examining presents the study‟s research methods, introduces the social scenarios for TV. Eleven participants took part in the participants and their defining characteristics, and three-part study that included in-home field visits, a diary summarizes the study‟s findings in terms of the study of participants‟ daily usage of TV and social media, participants‟ current TV and social media usage and their and participatory design sessions. During the participatory interest in social scenarios for the TV. design sessions, participants evaluated and discussed several paper wireframes of potential social TV applications. Overall, participants responded to most social TV concepts with excitement and enthusiasm, but were leery of scenarios Related Work that they felt violated their privacy. In recent years, a great deal of research has been conducted around the use of blogs and online social networks. Studies exploring social television applications have been Introduction fewer in number, likely due to the limited availability of Whether in the form of blogs or online social networks, such applications in consumers‟ homes.
    [Show full text]